Pages

Deep Web Secrecy and Security is an interactive internet-based book that is a guide to keeping private and secure on the internet, as well as a guide to exploring the hidden realms of the deeper internet. It is a 46-page guide with many links to the services or sites being described. The guide is written by Conrad Jaeger, the pen name for the writer of the Techtivist, a column on Occupy.com The guide is sold in pdf and ebook versions online for under $10. It is available from Deep Web Guides, Amazon, Barnes and Noble.

I come as a novice to the topic of web security and security. The guide says the deep web is used mainly for three purposes – porn, crime, and spying. I have no interest in partaking in any of those. However, web security is of interest to me.

I tend to be very open on the internet, because I think it is important that there be some “real” people with stated ideas and values letting themselves be known on the internet. Things such as Twitter and comment boards have been overtaken by anonymous or sock puppet users behaving in abusive, counterproductive ways. I think there should be some real people operating under their real names and standing up for what they believe to be right and good. However, this leaves me, and others like me, open to extreme abuse by hordes of sock puppets, cointelpro agents, internet troll gangs, and mentally ill stalker/ defamers.

Therefore, I came to this book with the point of view that I wish to use my real identity and be known, but wish to protect myself. From this perspective, I immediately loved the book and put the helpful ideas into practice as I read the book. I started off with checking my cookies. I often reset my browser, which removes all cookies. I checked to see which sites had deposited cookies and was shocked to see that sites I considered of little importance, that I had only briefly visited, had deposited the most cookies.

The book also has information on VPNs and many other topics of interest to me. But, is this advice solid? This is where I need to turn to people far more knowledgeable than I am on this topic. The very first person I turned to for expert advice was a young woman who is known as an internet security advocate and organizer. She refused to review the book. I say this because I think women should be treated as tech experts, and I welcome any to please email me and write a review.

I then turned to two men whom I consider to be masters on this topic and whose opinions I consider trustworthy:Kenneth Lipp, active in the Philadelphia Cryptoparty and one of the original OWS members; and Anonymous, an international Anon.

+++

from Kenneth Lipp: Although not qualified to assess all of the technical aspects of this book, in my experience the practical instructions on using Tor/security technology are sound and accessible. However, language in the introduction regarding making one "impossible to find" or monitor seems misleading. There is no 100% secure method of obscuring one's identity and/or location, and I believe it is important for this fact to be a solid part of anyone's information awareness when working online.

One point about the title and terminology: while those operating in 'tunnels' or VPNs would be a part of the "Deep Web" by its broadest definition, the term is most commonly used to refer to that part of the internet which is not crawled and archived by Google (more generally, the major metasearch engines), to include many private networks, repositories, and academic databases. In this milieu there are methods and tools for search and discovery (see:http://www.lib.berkeley.edu/TeachingLib/Guides/Internet//InvisibleWeb.html). There are even proprietary search engines for the "deep web," such as Infomine and ipl2.

+++

from Anonymous: For a book of few pages, it certainly covers a lot of information.

This book is concisely written, accurate, and very accessible. It's an easy read for the computer novice, average user, as well as the tech-nerds.

It covers a broad swathe of, not only pro-sec tips, but it also touches on the roots of the good side of the internet and the deep underbelly of the bad.

It provides great advice on how to sail safely on the internet, as well as providing background and reasons as to why one should ALWAYS be proactive about ensuring your computer is secure.

Studies show that, in America, people have a VERY high confidence level in their internet security, yet these same studies also prove that the security levels are extremely weak. Conversely, these same studies show that in some countries, which shall remain nameless (do the research yourself if you're interested ;-P), have very low confidence levels in their security but are some of the most secure in the world.

This book doesn't recommend that one go out and buy Anti-Virus software, nor do I. That's one of the things I like most about this book. It actually informs one how the 'net operates and what one can and should do to remain safe.

As a seasoned veteran of these things, I am very familiar with these aspects of the net but I still enjoyed the read.

It's clearly written by one who is both knowledgeable about the workings of the internet and altruistic at the same time. I admire the effort, sincerity and pricing of this book. I mean, think about it, how often does one come across such an educational and beneficial book at such a price.

Not to sound like a shill. I don't know the author or those affiliated. I write this review as a disconnected, non-partisan, Anon. So, please take the next paragraph to heart.

I'm writing this as one who got the book for free to review. As someone who does nothing "illegal," so to speak, but often battles pedophilia on the net, tries to facilitate safe communications to the citizens of countries who are being oppressed, and defends the human rights and safety of others, I would recommend this book to all.

Many, true and old-school Anonymous and netizens, will be familiar with a lot that this book covers. BUT, I assure you, it is still very informational and educational. It will prove especially useful to those who are not familiar with the pro-sec aspects of the net. To those who are not knowledgeable about staying safe, this is a MUST-READ. To those who are, I would say it is a nice refresher and will probably remind you of a few things you may have forgotten to do.

Whether you use a Macintosh or PC, this is a must-read.

Sincerely,

Merely one Anonymous of a Legion

P.S. I write this not as a representative of Anonymous, as we are leaderless. Despite what your Governments and/or Mainstream-media may tell you, we do fight for you. Stay educated and safe."

The U.S. Copyright Office ECO (Electronic Copyright Office) has discontinued Form CO, for Collections. This was the form I used the most. The Office says users of the form made a lot of mistakes. Also, some lower federal courts have recently refused to give copyright protection on the unlisted elements in a collection.

So, for now at least, it looks like each song should be registered separately, either using Form PA for the underlying music and lyrics or Form SR for the underlying music, lyrics and the sound recording. Form CON is for Continuing info that does not fit on the other forms.

It looks as if a collection could be registered using SR or PA and placing the song names and info into Section 1 and additional info onto Form CO. However, with those lower court rulings, the safest bet is to register each song separately.

Here are links to the "paper" forms,
for use as reference to the info that will be asked on the ECO forms:

Sue Basko

Sue Basko is a lawyer in California, Illinois, and is an attorney and counsellor of the U.S. Supreme Court. She works in law for music, film, design, indie journalism, protest law, and land use planning. She earned a Juris Doctorate graduating maga cum laude. She has a B.A. in Film and Video and attended graduate school in Radio/ TV/ Film with an emphasis on digital production, media law, and management. She has produced and directed hundreds of low-budget TV shows and videos, as well as doing video, audio, and lighting tech on many large-scale events. She made shows for such organizations as Chicago Public Libraries, Chicago Public Schools, National Strategy Forum, Art Institute of Chicago. She hired crews and handled budgets. She directed tech on a large scale rave style dance floor, with special effects and computer-controlled lights. She worked staff at Northwestern University School of Law with the classes in Trial Practice, Trial Advocacy, Negotiations, and National Institute of Trial Advocacy (NITA).

Susan Basko assisted with a 2012 study conducted by OSCE-ODIHR (Organization for Security and Cooperation in Europe, Office of Democratic Institutions and Human Rights). She participated in a summit of many nations in Vienna, Austria, where her legislative proposals regarding independent media use in protests/ public assemblies were adopted and sent to the 70+ member nations.

Recently, she attended a semester-long seminar course taught by Deray McKesson of Black Lives Matter fame at the University of Chicago Institute of Politics. She also participated in Harvard University's School for Resistance.

CONTACT easily by email:

suebaskomusic@gmail.com

Notice

Folks, if it is not on my blogs (see links on sidebar), or on my owntwitter or my facebook, it is not me. I am never involved in anything distasteful or questionable. If you see something like this, it is not my words or work, but that of stalkers/ crazies.